Cybersecurity culture & human behaviour – Intermediate
Operators
Course description
This course focuses on the critical role that human factors play in cybersecurity and provides strategies for effective communication during and after security incidents. It is designed for individuals in non-technical roles with access to the technical infrastructure through severely constrained HMI, to deepen their understanding of cybersecurity risks and response strategies.
The first part of the course addresses human factors in cybersecurity. Participants will learn to differentiate between different types of human failures by exploring the roles of both users and attackers. Real-world cybersecurity incidents will be analysed to demonstrate why human behaviour is often considered the weakest link in an organisation’s security chain. Practical tools and methodologies for identifying and mitigating human-related vulnerabilities are introduced. Additionally, the course underscores the importance of fostering a just culture that encourages transparent reporting of security incidents without fear of reprisal.
The second part of the course covers crisis communication. Participants will gain the skills needed to communicate effectively during and after a cybersecurity incident. This includes crafting clear, timely and coordinated messages to maintain organisational trust and minimise potential damage.
Learning Outcomes
By completing this training, participants will:
- Gain insights into the role of human behaviour in cybersecurity and dynamics between user and attacker
- Analyse past cybersecurity incidents to understand why humans are often considered the weakest link in security
- Learn to utilise various tools and methodologies to mitigate human error and enhance security measures
- Understand the importance of a just culture and reporting in fostering a proactive cybersecurity environment and preventing future incidents
- Develop effective communication strategies for use during and after a cybersecurity incident, ensuring compliance with GDPR and maintaining stakeholder trust
Further instructions
The training is free of charge and offered as self-paced e-learning available on demand (duration: approximately 2 hours) from April 2025 to October 2025. It is also available as an online instructor-led session on the following dates XX (duration: approximately 4 hours).
To move forward in this e-learning course, watch each video completely before starting the next lesson. The system is designed to track your progress and will only unlock the subsequent lessons once the current video has been completely viewed. Additionally, after completing each lesson, you must manually mark it as completed to confirm your understanding and maintain an organised learning flow. These steps are crucial for ensuring a seamless and effective learning experience.
Enjoy the training!